Random Number Generators and Information Security
From Computing and Software Wiki
Revision as of 06:43, 1 December 2007 by
Caoff
(
Talk
)
(
diff
)
← Older revision
|
Current revision
(
diff
) |
Newer revision →
(
diff
)
Jump to:
navigation
,
search
Contents
1
What is a Random Number Generator?
2
Relevance to Information Security
3
Vulnerability
4
True or Pseudo Randomness
4.1
Physical Methods
4.2
Computational Methods
4.3
Pros and Cons
5
Examples of True Random Number Generators
5.1
RANDOM.org
5.2
Hotbits
5.3
Lavarand
6
Pseudo-Random Number Generators
6.1
Middle-squared Method
6.2
Blum Blum Shug
6.3
CryptGenRandom
7
Conclusion
What is a Random Number Generator?
Relevance to Information Security
Vulnerability
True or Pseudo Randomness
Physical Methods
Computational Methods
Pros and Cons
Examples of True Random Number Generators
RANDOM.org
Hotbits
Lavarand
Pseudo-Random Number Generators
Middle-squared Method
Blum Blum Shug
CryptGenRandom
Conclusion
Views
Page
Discussion
View source
History
Personal tools
Log in
Navigation
Main Page
Community portal
Current events
Recent changes
Random page
Help
Search
Toolbox
What links here
Related changes
Special pages
Printable version
Permanent link